<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tsclient — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tsclient/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 17:46:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tsclient/feed.xml" rel="self" type="application/rss+xml"/><item><title>Execution via TSClient Mountpoint</title><link>https://feed.craftedsignal.io/briefs/2026-05-execution-from-tsclient-mup/</link><pubDate>Tue, 12 May 2026 17:46:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-execution-from-tsclient-mup/</guid><description>The rule detects execution of processes from the Remote Desktop Protocol (RDP) shared mountpoint tsclient on Windows hosts, which may indicate a lateral movement attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of processes originating from the <code>tsclient</code> mount point in Windows environments. The <code>tsclient</code> directory is used by Remote Desktop Protocol (RDP) to share local resources, such as drives, from the client machine with the remote host. Attackers can leverage this shared mount point to transfer and execute malicious payloads on the target system, thereby achieving lateral movement within the network. Successful exploitation may lead to unauthorized access to sensitive data and systems, further compromising the organization&rsquo;s security posture. This behavior is detected via process monitoring on the endpoint and analysis of the process executable path. The rule aims to detect post-exploitation activity, not initial access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s machine, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker establishes an RDP session to a target host within the network.</li>
<li>The attacker copies a malicious executable to a drive shared via RDP&rsquo;s <code>tsclient</code> mountpoint.</li>
<li>On the target host, the attacker navigates to the <code>\\Device\\Mup\\tsclient</code> directory, representing the shared drive.</li>
<li>The attacker executes the malicious executable from the <code>tsclient</code> directory. This execution could be triggered via command line, script, or other execution mechanisms.</li>
<li>The malicious executable performs actions such as reconnaissance, privilege escalation, or lateral movement.</li>
<li>The attacker utilizes the compromised host to pivot and compromise other systems within the network.</li>
<li>The attacker achieves their objectives, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on the target system, potentially leading to complete system compromise. This can result in data theft, system disruption, or further lateral movement within the network. The number of victims and sectors targeted depends on the attacker&rsquo;s objectives and the scope of the compromised environment. The rule detects potential lateral movement attempts and unauthorized code execution, which could lead to severe data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided to your SIEM to detect execution from the TSClient mountpoint and tune for your environment.</li>
<li>Enable process creation logging with full command line auditing (e.g., via Sysmon) to ensure the rule has the necessary data to function (Data Source: Sysmon, Windows Security Event Logs).</li>
<li>Investigate and validate any alerts generated by the Sigma rule to determine if the execution from the TSClient mountpoint is legitimate or malicious (Sigma Rule).</li>
<li>Consider restricting RDP access and disabling drive redirection where possible to minimize the attack surface (Overview).</li>
<li>Implement application control policies to prevent the execution of unauthorized executables from the TSClient mountpoint (Overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>rdp</category><category>tsclient</category><category>windows</category></item></channel></rss>